Employment
Research Analyst/Director - Security, Risk Management, and Compliance
Enterprise Management Associates
March 2022 - Present
• Cyber Security, Risk Management, and Compliance
President and Managing Editor
Client Solutions Development/Senior Systems Engineer
Federal Contractor
October 2015 – February 2022 (6 years 6 months) Shepherdstown, WV
• Cyber Security Specialist for Federal agency
Senior Security Engineer
Federal Contractor
September 2014 – September 2015 (1 year 1 month) Frederick, MD
• Cyber Security Specialist for Federal agency
Cyber Security Operations Engineer (Senior Consultant)
Federal Contractor
March 2012 – September 2014 (2 years 7 months) Falling Waters, WV
• Cyber Security Specialist for Federal agency
Cyber Security Senior Consultant
Federal Contractor
June 2011 – March 2012 (10 months) Martinsburg, WV
• Cyber Security Specialist for Federal agency
Information Assurance Engineer
Federal Contractor
August 2006 – June 2011 (4 years 11 months) Frederick, MD
Information Assurance Engineer, Frederick, MD
• Information Assurance for Federal defense agency
Education
Bachelor's of Science - Computer Science
Mount Saint Mary's University
Class of 2006
Certifications
CompTIA Security+
CompTIA Advanced Security Practitioner (CASP)
Publications
My very first book - including types of identity theft, impact of identity theft, reducing risk, and what to do if it happens to you
All of my books are available for purchase on this web page.
Social Engineering - You Are a Target
One hour long training webinar to help employees identify phishing attempts
The Need for a Cyber Attack Warning System
Guest blog post and RFUN 2013 Conference presentation for Recorded Future
Tricks of the Trade – How Malware Authors Cover Their Tracks
As security applications evolve to detect more advanced malware, the authors of said malware must adapt and develop new tricks to avoid detection
Voices in the Static – Proactive Cyber Threat Monitoring
Proactive threat monitoring is by no means an end-all solution - and security best practices should continue to be followed by your organization. However, adding proactive threat monitoring to your cyber security toolbox, much like checking the weather report, will help your organization prepare for any upcoming “cyber storms”.